Movatterモバイル変換


[0]ホーム

URL:


US7206847B1 - Smart card with back up - Google Patents

Smart card with back up
Download PDF

Info

Publication number
US7206847B1
US7206847B1US09/575,749US57574900AUS7206847B1US 7206847 B1US7206847 B1US 7206847B1US 57574900 AUS57574900 AUS 57574900AUS 7206847 B1US7206847 B1US 7206847B1
Authority
US
United States
Prior art keywords
personal data
data storage
storage device
personal
smart card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US09/575,749
Inventor
William P. Alberth, Jr.
Michael Kotzin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google Technology Holdings LLC
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola IncfiledCriticalMotorola Inc
Priority to US09/575,749priorityCriticalpatent/US7206847B1/en
Assigned to MOTOROLA, INC., CORPORATE OFFICESreassignmentMOTOROLA, INC., CORPORATE OFFICESASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: KOTZIN, MICHAEL, ALBERTH, WILLIAM P. JR.
Application grantedgrantedCritical
Publication of US7206847B1publicationCriticalpatent/US7206847B1/en
Assigned to Motorola Mobility, IncreassignmentMotorola Mobility, IncASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MOTOROLA, INC
Assigned to MOTOROLA MOBILITY LLCreassignmentMOTOROLA MOBILITY LLCCHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: MOTOROLA MOBILITY, INC.
Assigned to Google Technology Holdings LLCreassignmentGoogle Technology Holdings LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MOTOROLA MOBILITY LLC
Anticipated expirationlegal-statusCritical
Expired - Fee Relatedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Smart card security is enhanced by making the smart card a two-piece device. Both parts of the smart card contain copies of user data and a processor, which executes program instructions stored in the smart card half so as to give each part of the two-part smart card security and intelligence. Both parts must be in communication with each other for the data in either card to be accessible and useable. By separating the two pieces, data compromise is virtually impossible.

Description

FIELD OF THE INVENTION
This invention relates to data security devices. In particular, this invention relates to a method and apparatus for securely storing data in a personal data security device commonly known as a smart card.
BACKGROUND OF THE INVENTION
“Smart cards” as they are known, physically resemble the now ubiquitous credit cards but their similarities end there. These credit-card replacements are described in the literature. By way of example, they are described in an article appearing on page 47 of the February 1997 edition of the IEEE Spectrum magazine which is entitled “In Your Pocket Smartcards” by Carol Hovenga Fancher.
While smart cards physically resemble credit cards, smart cards are far more powerful in that they have one or more microcontrollers embedded in them which manage access to, and storage of, sensitive data that is actually stored in memory devices on the smart card. Data that might be stored in a smart card includes bank account numbers, personal data as well as a complete medical history, or the electronic equivalent of currency. Smart cards are widely used in Europe and are expected to eventually replace the library of cards most people carry and which include credit cards, phone cards, transit passes, frequent flyer cards, car rental cards and social security card.
Credit cards on the other hand, as well as debit cards and “ATM” (automatic teller machine) cards are mere sheets of plastic that are embossed with a series of numbers and letters that represent either the card number or an account number. A strip of magnetized material that is typically attached to one side of the card is programmed (magnetized) with a limited amount of data, typically the same number that is embossed on the card. When the card is “swiped” through a reader, information programmed into the magnetic strip is read.
While the security systems employed with smart cards is quite robust, losing a smart card might be considered to be roughly the equivalent of losing a wallet or purse—filled with money. Accordingly, for those who use a smart card and who want the highest possible security there will always exist the need for additional security measures.
SUMMARY OF THE INVENTION
The security of a personal data storage device (a smart card) is enhanced by providing to the smart card an additional layer of security in the form of an enabling key, which when coupled to the smart card enables the processor on the smart card to access and change storage information. If the enabling key is not accessible to the smart card, the smart card remains disabled.
In one embodiment the enabling key is physically connected to a terminal of the smart card. In another embodiment, a wireless radio link between the enabling key and smart card is used.
In every embodiment, the smart card is disabled if the enabling key and its own processor and data are not detected and accessed by the smart card. An additional level of security is realized by physically detaching (or geographically separating) the smart card and the enabling key in which event the smart card is disabled, preventing theft. If the key-fob enabling key is lost, intelligence on the smart card provides the smart card issuer sufficient data with which the key can be replicated. If the smart card is lost by the key fob is still available, data on the fob permits the card issuer to recreate the smart card data in its entirety.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 depicts a simplified representation of a two-part smart card, both parts of which are required to provide smart card functionality.
FIG. 2 depicts a simplified flow chart of the disclosed method.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
FIG. 1 shows a simplified representation of a two-part personal data storage device, also known as asmart card100 which provides increased security for sensitive user data such as credit card numbers, bank account numbers, medical history, electronic cash equivalency. Such data and data or information and records of similar import is referred to hereinafter as a set of user data.
A first part of thesmart card102 includes within it aprocessor104 and at least one memory device, typically electrically erasable programmable read only memory106 (EEPROM) but also possibly including read only memory (ROM) as well as random access memory (RAM), accessible via an address/data bus108 that effectively couples together, devices that are operatively coupled to thebus108.
As those skilled in the art will recognize, semiconductor memory can readily be placed on the substrate for theprocessor104 as well as on its own separate substrate. In addition to theprocessor104 and memory, abi-directional data interface110, which is also coupled to thebus108, provides a mechanism by which the first part of thesmart card102 can communicate with external devices, such as thesecond part112 of the two-partsmart card100. Thebi-directional data interface110 is also coupled to theprocessor104 andmemory106 through thebus108.
Thesecond part112 of the two-partsmart card100 also incorporates within it aprocessor116,memory118 and an I/O port120, all of which are coupled together via aseparate bus130. The I/O port120 can be considered to be a second interface circuit. The first and second interface circuits (110 and120 respectively) grant communications access to the respective first and second smart card parts (102,112 respectively). Electrical and mechanical coupling between the first andsecond ports110,120 so as to achieve an electrical connection between the two smart card parts is preferably accomplished using any appropriate mechanical electrical connector device (not shown but known to those skilled in the connector art) but selected depending upon the desired physical characteristics of the smart car when the two portions are together. Alternate embodiments would include using a RF data link, an optical link or an infrared link as well.
As shown inFIG. 1, abroken line119 serves only to represent that all of the functionality of thesecond part112 is embodied on a single piece of silicon, which in the preferred embodiment is also how the functional elements of thefirst part102 are packaged.
Thefirst part102 of the smart card is considered hereinafter to be a first user data storage device in that it actually stores a first set of a users data (such as that listed above) within memory devices physically part of the device. Thesecond part112 of the smart card is considered to be a second user data storage device in that it too stores the first set of user data within it.
With respect to both of the smart card parts, theprocessors104,116 (within the correspondingsmart card parts102,112) are coupled to the various circuits within each portion of the respective smart card parts by way of thebusses108,130 which carry information between the various circuits that are coupled to it. By way of the busses, the processors are able to execute the instructions stored invarious memory devices106,118 coupled to thebusses108,130. The programs stored in memory give the smart card portions intelligence. Various data can be written into the firstsmart card part102 via thedata interface circuit110 such as a serial or parallel computer-to-computer data link (RS-232, IEEE 488, or other equivalent data pathway) or perhaps via a wirelessRF data port109, (but also including an optical or infrared data port as well), coupled to theprocessor104. With respect to the secondsmart card port112, data can be written into the second smart card via its ownsimilar data port120 or perhaps its ownwireless port124. Once data is written into the smart card parts, accessing the data or changing it is controlled by security measures designed into the smart card processor software. By appropriate program instructions and an appropriate reader, a smart card issuer can read data stored in memory of either smart card half, and reconstruct data in a missing half in that the respective halves of the smart card can be made to be substantially duplicate copies of each other.
Enhanced smart card security is achieved by denying access to the data stored in the first part of thesmart card102, if thesecond part112 is not accessible to the first part102 (and vice versa), by either a wireless data exchange or a direct, electrical connection between the first and second parts. Software that controls the processor in thefirst part104 denies access to stored data in thefirst part104 if the second part of thecard112 is considered to be missing (or inaccessible to the first part). Similarly, access to data in thesecond part112 is denied if the first part of thecard104 is missing from the second part (or inaccessible). By separating the two parts of the card, a card owner can effectively preclude anyone from using the card or accessing information stored in the respective parts.
Stored data security is enhanced even further if the data stored in the smart card parts is encrypted using data encryption techniques described in the prior art. Data security techniques for smart cards is disclosed in the literature. See for example “Locking the e-safe” by Robert W. Baldwin and C. Victor Chang of RSA Data Security, Inc. published in the February 1997 edition of the IEEE Spectrum, the teaching of which is incorporated herein by reference.
A transaction using the two-part smart card preferably proceeds according to the steps of themethod200 depicted inFIG. 2. Instep202, the two-part smart card user initiates a desired transaction, which might include reading or writing a medical record or purchasing goods or services using data stored in the smart card that represents currency of the card user. Before any data within thesmart card100 can be accessed or changed, a data handshake between theprocessor104 and a terminal of a vendor or merchant takes place via thewireless port109 or the I/O port110 either of which can be considered a first interface circuit. The first and second interface circuits grant conditional communications access to the data using an appropriate data exchange protocol. Various protocols as are known in the art can be used.
After the initial data handshake of a transaction is initiated, software within the first part of thesmart card102 and the second part of thesmart card112 exchange encryption keys which are required to access stored information. In a preferred, embodiment, the first and second encryption keys are the same. In step204, software programmed into thefirst part102 of the smart card confirms that thesecond part112 is the unique mate to the first part by way of the encryption key exchange.
In the preferred embodiment of the invention, a first set of user data (to be referred to as stored value) resides in bothpart102 andpart112 of the two-part smart card. Instep206, the first part of thesmart card102 reads stored value from the second part after the stored value is encrypted by theprocessor116 of thesecond part112 in order to prevent interception of the data as it crosses the boundary between the first andsecond parts102,112 respectively.
In step208, after receiving the encrypted stored value, which thefirst part102 decrypts, the first part confirms that the value it received from the second part identically matches the value stored in thefirst part102. If as instep210, the value received into thefirst part102 does not match the value stored in the second part, one or both parts sets anerror condition flag212 and re-attempts to confirm the identity of the second part by returning to step204.
If the value received (or perhaps other user data, such as the user's medical history) into thefirst part102 matches the amount that was stored in thesecond part112, theprocessor102 sets a transaction complete flag instep216 and proceeds to conclude the transaction that was started instep202. If the smart card user is purchasing some goods or service or performing some other transaction (as indicated by the broken line from decision block210), value is transferred from the first part via the I/O port110 or the wireless connection or link109 to compatible data equipment of the vendor. In step214, a financial transaction is performed (buying goods or services for example, or the stored value is incremented or decremented by a financial institution for instance), the processor in thefirst part104 adjusts the stored value by the amount that was transferred, encrypts the new value and transfers the new value to thesecond part112 for storage. By preventing transactions unless both parts are available throughout the entire transaction, the issuer of the smart card is guaranteed that the stored value is always the same in both parts.
Increased security is realized if the first and second smart card parts are separated.
By physically or electrically separating the two parts, it becomes impossible to access data stored in thesecond part112 or in thefirst part102. In the event one piece is lost, by using data stored in the complementary piece, the smart card issuer or agent thereof, (having appropriate software and hardware, which is recognized by the software of thesmart part parts102,112) can recreate the data stored in the other part because both card parts carry duplicate copies of data stored in each other. In applications like pre-paid phone cards and the like, economic loss caused by physical card loss can be reduced by keeping part of the card in the user's possession at all times.
By using a two-part smart card that is designed to require that both halves be in communication with each other, the likelihood of data loss or economic theft is reduced. Inasmuch as the halves can be physically separated, by keeping one half of the card secure, data in the other half is fully protected. If either half of the card is lost or destroyed, the remaining value or data can be recovered to the user by the card issuer.

Claims (17)

1. A personal data storage apparatus comprised of:
a. a first personal data storage device including a memory device storing:
i. a first set of user data;
ii. a first encryption key for encrypting at least part of said first set of user data;
b. a first interface circuit coupled to said memory device granting conditional access to a third device to data therein using an appropriate data exchange protocol between the first personal data storage device and the third device only when a second personal data storage device is operatively coupled to said first personal data storage device;
c. a second interface circuit coupled to said memory device and providing communications access to the second personal data storage device; and
d. a processor, operatively coupled to said memory device and to said first and second interface circuits, the processor configured to adjust the first set of user data to create an adjusted first set of user data in response to a transaction with the third device, the processor further configured to encrypt the adjusted first set of user data to create an encrypted adjusted first set of user data, and the processor further configured to transfer the encrypted adjusted first set of user data to the second personal data storage device via the second interface circuit.
7. A personal data storage apparatus comprised of:
a. a first personal data storage device comprising:
i. a first memory device storing:
1. a first set of user data;
2. a first encryption key for encrypting at least part said first set of user data;
ii. a first interface circuit coupled to said memory device granting conditional access to data therein using a predetermined protocol and only when a second personal data storage device is operatively coupled to said first personal data storage device;
iii. a second interface circuit coupled to said memory device and providing access to a second personal data storage device;
b. a second personal data storage device coupled to said first personal data storage device and being comprised of:
i. the second memory device storing:
1. a substantially duplicate copy of said first set of user data;
c. a second encryption key for encrypting at least part said first set of user data;
ii. a second interface circuit coupled to said memory device granting conditional access to data therein using a predetermined protocol and only when said second personal data storage device is operatively coupled to said first personal data storage device;
whereby user data in either said first or second personal data storage device is accessible and usable only when said first and second personal data storage devices are in communication with each other, and
wherein said first personal data storage device is further comprised of a processor, operatively coupled to said first memory device and to said first and second interface circuits, the processor configured to adjust the first set of user data to create an adjusted first set of user data in response to a transaction with a third device, the processor further configured to encrypt the adjusted first set of user data to create an encrypted adjusted first set of user data, and the processor further configured to transfer the encrypted adjusted first set of user data to the second personal data storage device.
12. A method of securing access to data stored in a personal data storage device comprised of the steps of:
a. storing personal data in first and second data storage devices that are capable of being operably coupled to each other;
b. encrypting said personal data in a first data storage device using a first encryption key and encrypting the data in said second data storage device using a second encryption key;
c. granting access to a third device to said personal data in either said first data storage device or said second data storage device only when said first and second data storage devices are operatively coupled together;
d. adjusting the personal data to create an adjusted personal data in response to a transaction with the third device if access is granted to the third device to the personal data in either the first data storage device or the second data storage device;
e. encrypting the adjusted personal data to create an encrypted adjusted personal data; and
f. transferring the encrypted adjusted personal data to the second data storage device.
16. A method of securing access to data stored in a personal data storage device comprised of the steps of:
a. storing personal data in a smart card and an enabling key device that are capable of being operably coupled to each other;
b. encrypting said personal data in the smart card using a first encryption key and encrypting said personal data in the enabling key device using a second encryption key;
c. prohibiting a transaction between the smart card and another device unless the smart card and the enabling key device are operatively coupled together;
d. adjusting the personal data in the smart card to create an adjusted personal data in response to a transaction affecting the personal data if the smart card and the enabling key device are operatively coupled together;
e. encrypting the adjusted personal data to create an encrypted adjusted personal data; and
f. transferring the encrypted adjusted personal data to the enabling key device.
US09/575,7492000-05-222000-05-22Smart card with back upExpired - Fee RelatedUS7206847B1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US09/575,749US7206847B1 (en)2000-05-222000-05-22Smart card with back up

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US09/575,749US7206847B1 (en)2000-05-222000-05-22Smart card with back up

Publications (1)

Publication NumberPublication Date
US7206847B1true US7206847B1 (en)2007-04-17

Family

ID=37914225

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US09/575,749Expired - Fee RelatedUS7206847B1 (en)2000-05-222000-05-22Smart card with back up

Country Status (1)

CountryLink
US (1)US7206847B1 (en)

Cited By (50)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060112283A1 (en)*2004-11-222006-05-25International Business Machines CorporationEncrypting a credential store with a lockbox
US20070100754A1 (en)*2003-12-172007-05-03Brown Kerry DFinancial transaction network security
US20070106911A1 (en)*2005-11-092007-05-10Cisco Technology, Inc.Method and system for redundant secure storage of sensitive data by using multiple keys
US20080029609A1 (en)*2005-02-042008-02-07Chun-Hsin HoDual card system
US20090007258A1 (en)*2006-01-062009-01-01Verichk Global Technologies Inc.Secure Access to Information Associated With a Value Item
US20090113546A1 (en)*2007-10-302009-04-30Samsung Electronics Co., Ltd.Memory system for sensing attack
US20090159679A1 (en)*2007-12-202009-06-25Mastercard International, Inc.Ultra Low-Power User Authentication Device for Financial Transactions
US20090307489A1 (en)*2006-01-302009-12-10Kyocera CorporationMobile Communication Equipment and Method of Controlling Same
US20100074445A1 (en)*2008-09-252010-03-25Nokia CorporationEncryption/identification using array of resonators at transmitter and receiver
US20100287083A1 (en)*2007-12-282010-11-11Mastercard International, Inc.Detecting modifications to financial terminals
US20100293384A1 (en)*2009-05-122010-11-18Miodrag PotkonjakDigital Signatures
US20100293612A1 (en)*2009-05-122010-11-18Miodrag PotkonjakSecure Authentication
US20100322418A1 (en)*2009-06-172010-12-23Miodrag PotkonjakHardware Based Cryptography
US20110184994A1 (en)*2010-01-222011-07-28Arjun Prakash KumarNetwork and method for data input, storage and retrieval
WO2011157708A1 (en)2010-06-142011-12-22Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V.Methods and systems for securely handling datasets in computer systems
US20120005732A1 (en)*2009-03-132012-01-05Fujitsu LimitedPerson authentication system and person authentication method
US8117449B2 (en)2007-12-272012-02-14Mastercard International, Inc.Method to detect man-in-the-middle (MITM) or relay attacks
US20120089520A1 (en)*2008-06-062012-04-12Ebay Inc.Trusted service manager (tsm) architectures and methods
TWI382742B (en)*2007-05-182013-01-11Taisys Technologies Co LtdDual card system
US8527415B2 (en)2007-12-272013-09-03Mastercard International, Inc.Techniques for conducting financial transactions using mobile communication devices
US8571937B2 (en)2010-10-202013-10-29Playspan Inc.Dynamic payment optimization apparatuses, methods and systems
US8577803B2 (en)2011-06-032013-11-05Visa International Service AssociationVirtual wallet card selection apparatuses, methods and systems
US9117225B2 (en)2011-09-162015-08-25Visa International Service AssociationApparatuses, methods and systems for transforming user infrastructure requests inputs to infrastructure design product and infrastructure allocation outputs
US9355393B2 (en)2011-08-182016-05-31Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US9646291B2 (en)2011-05-112017-05-09Visa International Service AssociationElectronic receipt manager apparatuses, methods and systems
US9652765B2 (en)2008-08-262017-05-16Visa International Service AssociationSystem and method for implementing financial assistance programs
US9710807B2 (en)2011-08-182017-07-18Visa International Service AssociationThird-party value added wallet features and interfaces apparatuses, methods and systems
US9773212B2 (en)2011-02-282017-09-26Visa International Service AssociationSecure anonymous transaction apparatuses, methods and systems
US9830328B2 (en)2012-02-022017-11-28Visa International Service AssociationMulti-source, multi-dimensional, cross-entry, multimedia merchant analytics database platform apparatuses, methods and systems
US9953378B2 (en)2012-04-272018-04-24Visa International Service AssociationSocial checkout widget generation and integration apparatuses, methods and systems
US9953334B2 (en)2011-02-102018-04-24Visa International Service AssociationElectronic coupon issuance and redemption apparatuses, methods and systems
US9996838B2 (en)2011-03-042018-06-12Visa International Service AssociationCloud service facilitator apparatuses, methods and systems
US10096022B2 (en)2011-12-132018-10-09Visa International Service AssociationDynamic widget generator apparatuses, methods and systems
US10121129B2 (en)2011-07-052018-11-06Visa International Service AssociationElectronic wallet checkout platform apparatuses, methods and systems
US10154084B2 (en)2011-07-052018-12-11Visa International Service AssociationHybrid applications utilizing distributed models and views apparatuses, methods and systems
US10204327B2 (en)2011-02-052019-02-12Visa International Service AssociationMerchant-consumer bridging platform apparatuses, methods and systems
US10223691B2 (en)2011-02-222019-03-05Visa International Service AssociationUniversal electronic payment apparatuses, methods and systems
US10223710B2 (en)2013-01-042019-03-05Visa International Service AssociationWearable intelligent vision device apparatuses, methods and systems
US10223730B2 (en)2011-09-232019-03-05Visa International Service AssociationE-wallet store injection search apparatuses, methods and systems
US10242358B2 (en)2011-08-182019-03-26Visa International Service AssociationRemote decoupled application persistent state apparatuses, methods and systems
US10262148B2 (en)2012-01-092019-04-16Visa International Service AssociationSecure dynamic page content and layouts apparatuses, methods and systems
US10318941B2 (en)2011-12-132019-06-11Visa International Service AssociationPayment platform interface widget generation apparatuses, methods and systems
US10438176B2 (en)2011-07-172019-10-08Visa International Service AssociationMultiple merchant payment processor platform apparatuses, methods and systems
US10586227B2 (en)2011-02-162020-03-10Visa International Service AssociationSnap mobile payment apparatuses, methods and systems
US10825001B2 (en)2011-08-182020-11-03Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US11216468B2 (en)2015-02-082022-01-04Visa International Service AssociationConverged merchant processing apparatuses, methods and systems
US11288661B2 (en)2011-02-162022-03-29Visa International Service AssociationSnap mobile payment apparatuses, methods and systems
US11308227B2 (en)2012-01-092022-04-19Visa International Service AssociationSecure dynamic page content and layouts apparatuses, methods and systems
US11354723B2 (en)2011-09-232022-06-07Visa International Service AssociationSmart shopping cart with E-wallet store injection search
US11595820B2 (en)2011-09-022023-02-28Paypal, Inc.Secure elements broker (SEB) for application communication channel selector optimization

Citations (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5311595A (en)*1989-06-071994-05-10Kommunedata I/SMethod of transferring data, between computer systems using electronic cards
US5434395A (en)*1990-03-051995-07-18Jean-Rene StorckMethod and device for effecting a transaction between a first and at least one second data carrier and carrier used for this purpose
US5497418A (en)*1992-10-091996-03-05Nagra Plus S.A.Data processing system having a set of memory cards
US5763862A (en)*1996-06-241998-06-09Motorola, Inc.Dual card smart card reader
US5787101A (en)*1994-06-151998-07-28Thomson Consumer Electronics, Inc.Smart card message transfer without microprocessor intervention
US5923759A (en)*1995-04-201999-07-13Lee; Philip S.System for securely exchanging data with smart cards
US5978840A (en)*1996-09-261999-11-02Verifone, Inc.System, method and article of manufacture for a payment gateway system architecture for processing encrypted payment transactions utilizing a multichannel, extensible, flexible architecture
US5979773A (en)*1994-12-021999-11-09American Card Technology, Inc.Dual smart card access control electronic data storage and retrieval system and methods
US6003134A (en)*1997-01-131999-12-14Kuo; Chih-ChengSecure open smart card architecture
US6003014A (en)*1997-08-221999-12-14Visa International Service AssociationMethod and apparatus for acquiring access using a smart card
US6289324B1 (en)*1998-02-042001-09-11Citicorp Development Center, Inc.System for performing financial transactions using a smart card
US6324525B1 (en)*1996-06-172001-11-27Hewlett-Packard CompanySettlement of aggregated electronic transactions over a network
US6351813B1 (en)*1996-02-092002-02-26Digital Privacy, Inc.Access control/crypto system
US6581162B1 (en)*1996-12-312003-06-17Compaq Information Technologies Group, L.P.Method for securely creating, storing and using encryption keys in a computer system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5311595A (en)*1989-06-071994-05-10Kommunedata I/SMethod of transferring data, between computer systems using electronic cards
US5434395A (en)*1990-03-051995-07-18Jean-Rene StorckMethod and device for effecting a transaction between a first and at least one second data carrier and carrier used for this purpose
US5497418A (en)*1992-10-091996-03-05Nagra Plus S.A.Data processing system having a set of memory cards
US5787101A (en)*1994-06-151998-07-28Thomson Consumer Electronics, Inc.Smart card message transfer without microprocessor intervention
US5979773A (en)*1994-12-021999-11-09American Card Technology, Inc.Dual smart card access control electronic data storage and retrieval system and methods
US5923759A (en)*1995-04-201999-07-13Lee; Philip S.System for securely exchanging data with smart cards
US6351813B1 (en)*1996-02-092002-02-26Digital Privacy, Inc.Access control/crypto system
US6324525B1 (en)*1996-06-172001-11-27Hewlett-Packard CompanySettlement of aggregated electronic transactions over a network
US5763862A (en)*1996-06-241998-06-09Motorola, Inc.Dual card smart card reader
US5978840A (en)*1996-09-261999-11-02Verifone, Inc.System, method and article of manufacture for a payment gateway system architecture for processing encrypted payment transactions utilizing a multichannel, extensible, flexible architecture
US6581162B1 (en)*1996-12-312003-06-17Compaq Information Technologies Group, L.P.Method for securely creating, storing and using encryption keys in a computer system
US6003134A (en)*1997-01-131999-12-14Kuo; Chih-ChengSecure open smart card architecture
US6003014A (en)*1997-08-221999-12-14Visa International Service AssociationMethod and apparatus for acquiring access using a smart card
US6289324B1 (en)*1998-02-042001-09-11Citicorp Development Center, Inc.System for performing financial transactions using a smart card

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Baldwin et al., "Locking the e-safe", RSA Data Security, IEEE Spectrum, Feb. 1997.
Fancher, C., "In Your Pocket Smartcards", IEEE Spectrum, Feb. 1997, pp. 47.

Cited By (100)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070100754A1 (en)*2003-12-172007-05-03Brown Kerry DFinancial transaction network security
US8195959B2 (en)*2004-11-222012-06-05International Business Machines CorporationEncrypting a credential store with a lockbox
US20060112283A1 (en)*2004-11-222006-05-25International Business Machines CorporationEncrypting a credential store with a lockbox
US7866564B2 (en)*2005-02-042011-01-11Chun-Hsin HoDual card system
US20080029609A1 (en)*2005-02-042008-02-07Chun-Hsin HoDual card system
US7747861B2 (en)*2005-11-092010-06-29Cisco Technology, Inc.Method and system for redundant secure storage of sensitive data by using multiple keys
US20070106911A1 (en)*2005-11-092007-05-10Cisco Technology, Inc.Method and system for redundant secure storage of sensitive data by using multiple keys
US9397837B2 (en)*2006-01-062016-07-19Sicpa Holding SaSecure access to information associated with a value item
US20090007258A1 (en)*2006-01-062009-01-01Verichk Global Technologies Inc.Secure Access to Information Associated With a Value Item
US20090307489A1 (en)*2006-01-302009-12-10Kyocera CorporationMobile Communication Equipment and Method of Controlling Same
TWI382742B (en)*2007-05-182013-01-11Taisys Technologies Co LtdDual card system
US20090113546A1 (en)*2007-10-302009-04-30Samsung Electronics Co., Ltd.Memory system for sensing attack
US20090159679A1 (en)*2007-12-202009-06-25Mastercard International, Inc.Ultra Low-Power User Authentication Device for Financial Transactions
US8117449B2 (en)2007-12-272012-02-14Mastercard International, Inc.Method to detect man-in-the-middle (MITM) or relay attacks
US8527415B2 (en)2007-12-272013-09-03Mastercard International, Inc.Techniques for conducting financial transactions using mobile communication devices
US20100287083A1 (en)*2007-12-282010-11-11Mastercard International, Inc.Detecting modifications to financial terminals
US8417643B2 (en)*2008-06-062013-04-09Ebay Inc.Trusted service manager (TSM) architectures and methods
US20180218358A1 (en)*2008-06-062018-08-02Paypal, Inc.Trusted service manager (tsm) architectures and methods
US11521194B2 (en)*2008-06-062022-12-06Paypal, Inc.Trusted service manager (TSM) architectures and methods
US20120089520A1 (en)*2008-06-062012-04-12Ebay Inc.Trusted service manager (tsm) architectures and methods
US9852418B2 (en)*2008-06-062017-12-26Paypal, Inc.Trusted service manager (TSM) architectures and methods
US9652765B2 (en)2008-08-262017-05-16Visa International Service AssociationSystem and method for implementing financial assistance programs
US9742555B2 (en)*2008-09-252017-08-22Nokia Technologies OyEncryption/identification using array of resonators at transmitter and receiver
US20100074445A1 (en)*2008-09-252010-03-25Nokia CorporationEncryption/identification using array of resonators at transmitter and receiver
US20120005732A1 (en)*2009-03-132012-01-05Fujitsu LimitedPerson authentication system and person authentication method
US9032476B2 (en)*2009-05-122015-05-12Empire Technology Development LlcSecure authentication
US8850281B2 (en)2009-05-122014-09-30Empire Technology Development LlcDigital signatures
US20100293384A1 (en)*2009-05-122010-11-18Miodrag PotkonjakDigital Signatures
US20100293612A1 (en)*2009-05-122010-11-18Miodrag PotkonjakSecure Authentication
US8379856B2 (en)2009-06-172013-02-19Empire Technology Development LlcHardware based cryptography
US20100322418A1 (en)*2009-06-172010-12-23Miodrag PotkonjakHardware Based Cryptography
US8469279B2 (en)2010-01-222013-06-25Spqkumar Inc.Network and method for data input, storage and retrieval
US20110184994A1 (en)*2010-01-222011-07-28Arjun Prakash KumarNetwork and method for data input, storage and retrieval
DE102011077513A1 (en)2010-06-142012-08-23Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Method for the secure processing of data
DE102011077512A1 (en)2010-06-142012-03-01Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Method for the secure processing of data stored in an electronic safe
WO2011157708A1 (en)2010-06-142011-12-22Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V.Methods and systems for securely handling datasets in computer systems
US8571937B2 (en)2010-10-202013-10-29Playspan Inc.Dynamic payment optimization apparatuses, methods and systems
US10500481B2 (en)2010-10-202019-12-10Playspan Inc.Dynamic payment optimization apparatuses, methods and systems
US9757644B2 (en)2010-10-202017-09-12Playspin Inc.Dynamic payment optimization apparatuses, methods and systems
US10688385B2 (en)2010-10-202020-06-23Playspan Inc.In-application universal storefront apparatuses, methods and systems
US11311797B2 (en)2010-10-202022-04-26Playspan Inc.Dynamic payment optimization apparatuses, methods and systems
US11093919B2 (en)2011-02-052021-08-17Visa International Service AssociationMerchant-consumer bridging platform apparatuses, methods and systems
US10204327B2 (en)2011-02-052019-02-12Visa International Service AssociationMerchant-consumer bridging platform apparatuses, methods and systems
US10621605B2 (en)2011-02-102020-04-14Visa International Service AssociationElectronic coupon issuance and redemption apparatuses, methods and systems
US9953334B2 (en)2011-02-102018-04-24Visa International Service AssociationElectronic coupon issuance and redemption apparatuses, methods and systems
US10586227B2 (en)2011-02-162020-03-10Visa International Service AssociationSnap mobile payment apparatuses, methods and systems
US11288661B2 (en)2011-02-162022-03-29Visa International Service AssociationSnap mobile payment apparatuses, methods and systems
US10223691B2 (en)2011-02-222019-03-05Visa International Service AssociationUniversal electronic payment apparatuses, methods and systems
US11023886B2 (en)2011-02-222021-06-01Visa International Service AssociationUniversal electronic payment apparatuses, methods and systems
US11250352B2 (en)2011-02-282022-02-15Visa International Service AssociationSecure anonymous transaction apparatuses, methods and systems
US10482398B2 (en)2011-02-282019-11-19Visa International Service AssociationSecure anonymous transaction apparatuses, methods and systems
US9773212B2 (en)2011-02-282017-09-26Visa International Service AssociationSecure anonymous transaction apparatuses, methods and systems
US9996838B2 (en)2011-03-042018-06-12Visa International Service AssociationCloud service facilitator apparatuses, methods and systems
US11263640B2 (en)2011-03-042022-03-01Visa International Service AssociationCloud service facilitator apparatuses, methods and systems
US11263601B2 (en)2011-05-112022-03-01Visa International Service AssociationElectronic receipt manager apparatuses, methods and systems
US11853977B2 (en)2011-05-112023-12-26Visa International Service AssociationElectronic receipt manager apparatuses, methods and systems
US9646291B2 (en)2011-05-112017-05-09Visa International Service AssociationElectronic receipt manager apparatuses, methods and systems
US10489756B2 (en)2011-05-112019-11-26Visa International Service AssociationElectronic receipt manager apparatuses, methods and systems
US8577803B2 (en)2011-06-032013-11-05Visa International Service AssociationVirtual wallet card selection apparatuses, methods and systems
US10154084B2 (en)2011-07-052018-12-11Visa International Service AssociationHybrid applications utilizing distributed models and views apparatuses, methods and systems
US11900359B2 (en)2011-07-052024-02-13Visa International Service AssociationElectronic wallet checkout platform apparatuses, methods and systems
US10419529B2 (en)2011-07-052019-09-17Visa International Service AssociationHybrid applications utilizing distributed models and views apparatuses, methods and systems
US10121129B2 (en)2011-07-052018-11-06Visa International Service AssociationElectronic wallet checkout platform apparatuses, methods and systems
US11010753B2 (en)2011-07-052021-05-18Visa International Service AssociationElectronic wallet checkout platform apparatuses, methods and systems
US10803449B2 (en)2011-07-052020-10-13Visa International Service AssociationElectronic wallet checkout platform apparatuses, methods and systems
US10438176B2 (en)2011-07-172019-10-08Visa International Service AssociationMultiple merchant payment processor platform apparatuses, methods and systems
US11397931B2 (en)2011-08-182022-07-26Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US11037138B2 (en)2011-08-182021-06-15Visa International Service AssociationThird-party value added wallet features and interfaces apparatuses, methods, and systems
US9355393B2 (en)2011-08-182016-05-31Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US9959531B2 (en)2011-08-182018-05-01Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US10242358B2 (en)2011-08-182019-03-26Visa International Service AssociationRemote decoupled application persistent state apparatuses, methods and systems
US10354240B2 (en)2011-08-182019-07-16Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US10825001B2 (en)2011-08-182020-11-03Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US11803825B2 (en)2011-08-182023-10-31Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US11763294B2 (en)2011-08-182023-09-19Visa International Service AssociationRemote decoupled application persistent state apparatuses, methods and systems
US11010756B2 (en)2011-08-182021-05-18Visa International Service AssociationRemote decoupled application persistent state apparatuses, methods and systems
US9710807B2 (en)2011-08-182017-07-18Visa International Service AssociationThird-party value added wallet features and interfaces apparatuses, methods and systems
US12277537B2 (en)2011-08-182025-04-15Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US12022290B2 (en)2011-09-022024-06-25Paypal, Inc.Secure elements broker (SEB) for application communication channel selector optimization
US11595820B2 (en)2011-09-022023-02-28Paypal, Inc.Secure elements broker (SEB) for application communication channel selector optimization
US9117225B2 (en)2011-09-162015-08-25Visa International Service AssociationApparatuses, methods and systems for transforming user infrastructure requests inputs to infrastructure design product and infrastructure allocation outputs
US11354723B2 (en)2011-09-232022-06-07Visa International Service AssociationSmart shopping cart with E-wallet store injection search
US10223730B2 (en)2011-09-232019-03-05Visa International Service AssociationE-wallet store injection search apparatuses, methods and systems
US10096022B2 (en)2011-12-132018-10-09Visa International Service AssociationDynamic widget generator apparatuses, methods and systems
US10846670B2 (en)2011-12-132020-11-24Visa International Service AssociationPayment platform interface widget generation apparatuses, methods and systems
US10318941B2 (en)2011-12-132019-06-11Visa International Service AssociationPayment platform interface widget generation apparatuses, methods and systems
US10685379B2 (en)2012-01-052020-06-16Visa International Service AssociationWearable intelligent vision device apparatuses, methods and systems
US10262148B2 (en)2012-01-092019-04-16Visa International Service AssociationSecure dynamic page content and layouts apparatuses, methods and systems
US11308227B2 (en)2012-01-092022-04-19Visa International Service AssociationSecure dynamic page content and layouts apparatuses, methods and systems
US11074218B2 (en)2012-02-022021-07-27Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems
US9830328B2 (en)2012-02-022017-11-28Visa International Service AssociationMulti-source, multi-dimensional, cross-entry, multimedia merchant analytics database platform apparatuses, methods and systems
US10013423B2 (en)2012-02-022018-07-03Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia analytical model sharing database platform apparatuses, methods and systems
US11036681B2 (en)2012-02-022021-06-15Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia analytical model sharing database platform apparatuses, methods and systems
US10983960B2 (en)2012-02-022021-04-20Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia centralized personal information database platform apparatuses, methods and systems
US10262001B2 (en)2012-02-022019-04-16Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems
US10430381B2 (en)2012-02-022019-10-01Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia centralized personal information database platform apparatuses, methods and systems
US9953378B2 (en)2012-04-272018-04-24Visa International Service AssociationSocial checkout widget generation and integration apparatuses, methods and systems
US10223710B2 (en)2013-01-042019-03-05Visa International Service AssociationWearable intelligent vision device apparatuses, methods and systems
US11216468B2 (en)2015-02-082022-01-04Visa International Service AssociationConverged merchant processing apparatuses, methods and systems
US11941008B2 (en)2015-02-082024-03-26Visa International Service AssociationConverged merchant processing apparatuses, methods and systems

Similar Documents

PublicationPublication DateTitle
US7206847B1 (en)Smart card with back up
CN1344396B (en)Portable electronic payment and authorization device and method thereof
US7870998B2 (en)Private information exchange in smart card commerce
EP0981807B1 (en)Integrated circuit card with application history list
FancherIn your pocket: smartcards
US6983882B2 (en)Personal biometric authentication and authorization device
US6594759B1 (en)Authorization firmware for conducting transactions with an electronic transaction system and methods therefor
US5898783A (en)System and method for employing a telecommunications network to remotely disable a SIM or smartcard
CN101329786B (en)Method and system for acquiring bank card magnetic track information or payment application for mobile terminal
AU2022205660B2 (en)Devices, systems, and methods for public/private key authentication
TW498284B (en)Card memory apparatus
KR20140061474A (en)Improved device and method for smart card assisted digital content purchase and storage
JP2002507297A (en) Payment methods and systems
EP1053536A1 (en)System and method for controlling access to computer code in an ic card
JP2003123032A (en) IC card terminal and personal authentication method
JPH09265254A (en) Mutual authentication system for information storage media
AU740143B2 (en)Process to manange data in a chip card
JP2000507380A (en) Safety module
JP3693709B2 (en) Information writing / reading method for portable information recording medium
AU723525B2 (en)A method for certifying a running total in a reader
KR20240019899A (en)Private asset systems for protecting of digital and physical assets
KR20240019900A (en)Cold wallet activation system through physical combining of material object and cold wallet
Elhennawy et al.Smart Cards Structure and Applications: Emerging and Evolution
JPS62280965A (en)Protection system for information in ic card
Guthery et al.PART I—SMART CARD BACKGROUND AND BASICS CHAPTER 1—SMART CARD PROGRAMMING

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:MOTOROLA, INC., CORPORATE OFFICES, ILLINOIS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ALBERTH, WILLIAM P. JR.;KOTZIN, MICHAEL;REEL/FRAME:010831/0312;SIGNING DATES FROM 20000512 TO 20000518

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FPAYFee payment

Year of fee payment:4

ASAssignment

Owner name:MOTOROLA MOBILITY, INC, ILLINOIS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA, INC;REEL/FRAME:025673/0558

Effective date:20100731

ASAssignment

Owner name:MOTOROLA MOBILITY LLC, ILLINOIS

Free format text:CHANGE OF NAME;ASSIGNOR:MOTOROLA MOBILITY, INC.;REEL/FRAME:029216/0282

Effective date:20120622

FPAYFee payment

Year of fee payment:8

ASAssignment

Owner name:GOOGLE TECHNOLOGY HOLDINGS LLC, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA MOBILITY LLC;REEL/FRAME:034430/0001

Effective date:20141028

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20190417


[8]ページ先頭

©2009-2025 Movatter.jp